Free CompTIA Security+ Training

Virtualization Overview – CompTIA Security+ SY0-501 – 3.7

Virtualization is the cornerstone of today’s cloud-based technologies. In this video, you’ll learn how virtualization can be used to optimize the use of your hardware. << Previous Video: Code Quality and Testing Next: Virtualization Security >> Virtualization is a remarkable technology that allows you to run multiple individual operating systems, all on the same piece […]

Virtualization Overview – CompTIA Security+ SY0-501 – 3.7 Read More »

Code Quality and Testing – CompTIA Security+ SY0-501 – 3.6

Now that you’re written your application, how can determine if your code is secure? In this video, you’ll learn how to test and evaluate your application code. << Previous Video: Secure Coding Techniques Next: Virtualization Overview >> If you’re a developer who would like to test your code to see if there are any security

Code Quality and Testing – CompTIA Security+ SY0-501 – 3.6 Read More »

Secure Coding Techniques – CompTIA Security+ SY0-501 – 3.6

If you’re writing your own applications, there are a number of best-practices you should follow to ensure that your code is secure. In this video, you’ll learn about some of the most common secure coding techniques and how to implement them into your development process. << Previous Video: Provisioning and Deprovisioning Next: Code Quality and

Secure Coding Techniques – CompTIA Security+ SY0-501 – 3.6 Read More »

Provisioning and Deprovisioning – CompTIA Security+ SY0-501 – 3.6

In today’s dynamic infrastructures, application platforms are constantly created and dismantled. In this video, you’ll learn about the security concerns associated with provisioning and deprovisioning these application platforms. << Previous Video: Version Control and Change Management Next: Secure Coding Techniques >> The process of provisioning means that we’re going to make something available. That means

Provisioning and Deprovisioning – CompTIA Security+ SY0-501 – 3.6 Read More »

Version Control and Change Management – CompTIA Security+ SY0-501 – 3.6

Version control and change management procedures are important to both the operations team and the security team. In this video, you’ll learn about the security concerns associated with version control and how change management can be part of a safe infrastructure. << Previous Video: Secure DevOps Next: Provisioning and Deprovisioning >> There are always going

Version Control and Change Management – CompTIA Security+ SY0-501 – 3.6 Read More »

Secure DevOps – CompTIA Security+ SY0-501 – 3.6

The combining of development and operations provides some enhanced capabilities for the security team as well. In this video, you’ll learn about DevOps and how security is integrating into this new structure of application development and deployment. << Previous Video: Development Life-Cycle Models Next: Version Control and Change Management >> Traditionally, there have always been

Secure DevOps – CompTIA Security+ SY0-501 – 3.6 Read More »

Development Life Cycle Models – CompTIA Security+ SY0-501 – 3.6

There are many different ways to build an application. In this video, you’ll learn about two of the most popular life cycle models for application development; waterfall and agile. << Previous Video: Embedded Systems Next: Secure DevOps >> The process of building an application is referred to as the systems development lifecycle, although you may

Development Life Cycle Models – CompTIA Security+ SY0-501 – 3.6 Read More »

Embedded Systems – CompTIA Security+ SY0-501 – 3.5

We use embedded operating systems every day, but we don’t always consider the underlying operation and complexities of these embedded technologies. In this video, you’ll learn about the security concerns associated with many different embedded systems. << Previous Video: Secure Deployments Next: Development Life-Cycle Models >> SCADA stands for Supervisory Control and Data Acquisition System.

Embedded Systems – CompTIA Security+ SY0-501 – 3.5 Read More »

Secure Deployments – CompTIA Security+ SY0-501 – 3.4

It’s a long road between development and production. In this video, you’ll learn about the deployment process and how to secure every step along the way. << Previous Video: Peripheral Security Next: Embedded Systems >> Here’s a common challenge in many organizations. You’ve got a development team that has been working for months programming a

Secure Deployments – CompTIA Security+ SY0-501 – 3.4 Read More »

Peripheral Security – CompTIA Security+ SY0-501 – 3.3

We not only need to maintain the security of our computers, we also have to be concerned about the devices that we connect to our computers. In this video, you’ll learn how to secure your displays, printers, storage devices, and other peripherals. << Previous Video: Operating System Security Next: Secure Deployments >> We don’t often

Peripheral Security – CompTIA Security+ SY0-501 – 3.3 Read More »